Bigwig 1: Hey, we could make consumers happy by offerig microcode updates.
Bigwig 2: Yea, we could. Couldn't we also collect data too. Hey Mr. Coder, can you modify the microcode.
Coder: Sure, gimme a second
Bigwig 1: Runs the calculations we could make 4.5% more profit per sucker.
Bigwig 2: Do it.

And now all Intel processors collect data while they are in any powered state(even S4). Big Brother is watching you.

Thinkpad4by3's Law of the Universe.

The efficiency of two screens equally sized with equal numbers if pixels are equal. The time spent by a 4:3 user complaining about 16:9 is proportional to the inefficiency working with a 16:9 display, therefore the amount of useful work extracted is equal.

The efficiency of two screens equally sized with equal numbers if pixels are equal. The time spent by a 4:3 user complaining about 16:9 is proportional to the inefficiency working with a 16:9 display, therefore the amount of useful work extracted is equal.

Previously it was thought that the Intel core 2 Duo processors weren't susceptible to Spectre but Intel have clarified that they definitely are. Intel are working on Microcode updates for dual core processors and also for Arandale CPUs as found in the X201.

I also guess that long-term it will be impossible to avoid the core patches that affect performance, while keeping the rest of Windows up-to-date. So users who would rather performance over security would have to use the registry-tweaking tools (as long as Microsoft keeps those available).

I think the browser updates are probably the most important followed by OS updates and then BIOS or Microcode updates . Keep in mind that the success of these updates may not be 100% effective against the exploits without extensive CPU design.

It will be interesting to see if there are any attacks using these exploits so we can pause and see what gets reported.

I wouldn't be surprised if PC companies have asked Intel to stop work on older CPU Microcode updates because it affects their bottom line.

Apparently (again, according to InSpectre), the Sandy Bridge generation has no "high-performance Meltdown fix" in the CPU, so some performance degradation is inevitable if one wants to patch for Meltdown.